Legal Representation
Attorney
Kevin S. Costanza
USPTO Deadlines
Application History
21 events| Date | Code | Type | Description | Documents |
|---|---|---|---|---|
| Mar 25, 2015 | ARAA | I | ATTORNEY/DOM.REP.REVOKED AND/OR APPOINTED | Loading... |
| Mar 25, 2015 | REAP | I | TEAS REVOKE/APP/CHANGE ADDR OF ATTY/DOM REP RECEIVED | Loading... |
| Mar 16, 2015 | MAB6 | O | ABANDONMENT NOTICE MAILED - NO USE STATEMENT FILED | Loading... |
| Mar 16, 2015 | ABN6 | S | ABANDONMENT - NO USE STATEMENT FILED | Loading... |
| Aug 12, 2014 | NOAM | E | NOA E-MAILED - SOU REQUIRED FROM APPLICANT | Loading... |
| Jun 17, 2014 | NPUB | E | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED | Loading... |
| Jun 17, 2014 | PUBO | A | PUBLISHED FOR OPPOSITION | Loading... |
| May 28, 2014 | NONP | E | NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED | Loading... |
| May 9, 2014 | PBCR | Z | WITHDRAWN FROM PUB - OG REVIEW QUERY | Loading... |
| Apr 27, 2014 | PREV | O | LAW OFFICE PUBLICATION REVIEW COMPLETED | Loading... |
| Apr 27, 2014 | ALIE | A | ASSIGNED TO LIE | Loading... |
| Apr 7, 2014 | CNSA | P | APPROVED FOR PUB - PRINCIPAL REGISTER | Loading... |
| Apr 4, 2014 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
| Apr 4, 2014 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
| Apr 4, 2014 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
| Mar 12, 2014 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
| Mar 12, 2014 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
| Mar 12, 2014 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
| Mar 11, 2014 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
| Dec 7, 2013 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
| Nov 28, 2013 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 009
Computer software and hardware used to provide secure access, use and protection of computer networks, directory services, entities and digital data by monitoring and analyzing entity behavior; computer security products, namely, computer peripherals; computer software and computer hardware for detection, blocking, removal and remediation of computer viruses, Malwares rootkits, advanced persistent threats, malware, and malicious attacks; computer software for identifying and preventing malicious attacks on computers, computer systems, and digital devices; computer software and hardware providing secure virtual computer systems and virtual computer environments; downloadable databases in the field of statistics
First Use Anywhere:
0
First Use in Commerce:
0
Classification
International Classes
009